Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-45592
HistorySep 10, 2024 - 4:00 p.m.

CVE-2024-45592 auditor-bundle vulnerable to Cross-site Scripting because name of entity does not get escaped

2024-09-1016:00:14
CWE-79
GitHub_M
www.cve.org
2
auditor-bundle
symfony
cross-site scripting
entity property
twig macro
vulnerability

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

EPSS

0.001

Percentile

21.3%

auditor-bundle, formerly known as DoctrineAuditBundle, integrates auditor library into any Symfony 3.4+ application. Prior to version 5.2.6, there is an unescaped entity property enabling Javascript injection. This is possible because %source_label% in twig macro is not escaped. Therefore script tags can be inserted and are executed. The vulnerability is fixed in versions 6.0.0 and 5.2.6.

CNA Affected

[
  {
    "vendor": "DamienHarper",
    "product": "auditor-bundle",
    "versions": [
      {
        "version": "< 5.2.6",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

EPSS

0.001

Percentile

21.3%

Related for CVELIST:CVE-2024-45592